{"id":"https://openalex.org/W3127318453","doi":"https://doi.org/10.1109/isit45174.2021.9517958","title":"Information-theoretic Key Encapsulation and its Application to Secure Communication","display_name":"Information-theoretic Key Encapsulation and its Application to Secure Communication","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3127318453","doi":"https://doi.org/10.1109/isit45174.2021.9517958","mag":"3127318453"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9517958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ui.adsabs.harvard.edu/abs/2021arXiv210202243S/abstract","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036352923","display_name":"Setareh Sharifian","orcid":null},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Setareh Sharifian","raw_affiliation_strings":["University of Calgary,AB,Canada","University of Calgary , AB , Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary,AB,Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary , AB , Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["University of Calgary,AB,Canada","University of Calgary , AB , Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary,AB,Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary , AB , Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5036352923"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02011877,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2393","last_page":"2398"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.85774827003479},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.680159330368042},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6767699122428894},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6117014288902283},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5292503237724304},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4864828288555145},{"id":"https://openalex.org/keywords/pre-shared-key","display_name":"Pre-shared key","score":0.46556544303894043},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4608767330646515},{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation (networking)","score":0.4525172710418701},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4518888592720032},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.4490275979042053},{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.4438713788986206},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4178960919380188},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.41498544812202454},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.41465485095977783},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.3980174660682678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3907378315925598},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19371870160102844},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.09524959325790405}],"concepts":[{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.85774827003479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.680159330368042},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6767699122428894},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6117014288902283},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5292503237724304},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4864828288555145},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.46556544303894043},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4608767330646515},{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.4525172710418701},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4518888592720032},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4490275979042053},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.4438713788986206},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4178960919380188},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.41498544812202454},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.41465485095977783},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3980174660682678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3907378315925598},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19371870160102844},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.09524959325790405},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isit45174.2021.9517958","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9517958","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"mag:3127318453","is_oa":true,"landing_page_url":"https://ui.adsabs.harvard.edu/abs/2021arXiv210202243S/abstract","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null}],"best_oa_location":{"id":"mag:3127318453","is_oa":true,"landing_page_url":"https://ui.adsabs.harvard.edu/abs/2021arXiv210202243S/abstract","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W20180677","https://openalex.org/W1494774797","https://openalex.org/W1499934958","https://openalex.org/W1517444618","https://openalex.org/W1985623009","https://openalex.org/W2007661134","https://openalex.org/W2095653018","https://openalex.org/W2106833918","https://openalex.org/W2106895305","https://openalex.org/W2108777864","https://openalex.org/W2115109072","https://openalex.org/W2122987162","https://openalex.org/W2135915451","https://openalex.org/W2139172211","https://openalex.org/W2150154572","https://openalex.org/W2157679418","https://openalex.org/W2570008916","https://openalex.org/W2866028610","https://openalex.org/W2913555003","https://openalex.org/W2956549007","https://openalex.org/W3006433578","https://openalex.org/W3023478445","https://openalex.org/W4250498021","https://openalex.org/W6629148753","https://openalex.org/W6631325483","https://openalex.org/W6634971019","https://openalex.org/W6638278217","https://openalex.org/W6682172259","https://openalex.org/W6758557830","https://openalex.org/W6759107969","https://openalex.org/W6789464865","https://openalex.org/W6809259194"],"related_works":["https://openalex.org/W1482089796","https://openalex.org/W2186249182","https://openalex.org/W1605699871","https://openalex.org/W2099631081","https://openalex.org/W2999794863","https://openalex.org/W3028897955","https://openalex.org/W1998138529","https://openalex.org/W1556869568","https://openalex.org/W2592592472","https://openalex.org/W2364985103","https://openalex.org/W1587391206","https://openalex.org/W2107538542","https://openalex.org/W1967316369","https://openalex.org/W3047707811","https://openalex.org/W1984556380","https://openalex.org/W2580743865","https://openalex.org/W2949718231","https://openalex.org/W3020340105","https://openalex.org/W2000707443","https://openalex.org/W2368405831"],"abstract_inverted_index":{"A":[0],"hybrid":[1,66,99,126],"encryption":[2,49,67,100,127,207,231],"scheme":[3,101],"consists":[4],"of":[5,65,108,124,191,219,232],"a":[6,22,30,92,98,114,161,171,184,203,220],"public-key":[7],"part":[8,33],"called":[9,34],"the":[10,35,42,45,63,82,125,130,133,195,217,226],"key":[11,25,156,198,206],"encapsulation":[12,37],"mechanism":[13,38],"(KEM),":[14],"that":[15,40,89,117,145,175,186,209],"is":[16,164],"used":[17,53,201],"to":[18,74,168,181,199,228],"generate":[19],"and":[20,29,84,112,132,139,245],"establish":[21],"shared":[23,46],"secret":[24,155,197],"between":[26],"two":[27],"parties,":[28],"(symmetric)":[31],"secret-key":[32],"data":[36,43],"(DEM)":[39],"encrypts":[41],"using":[44],"key.":[47],"Hybrid":[48],"schemes":[50],"are":[51],"widely":[52],"for":[54,213,247],"securing":[55],"Internet":[56],"communication.":[57],"In":[58],"this":[59,188],"paper,":[60],"we":[61],"initiate":[62],"study":[64],"in":[68,97,102],"preprocessing":[69,103],"model":[70],"which":[71],"assumes":[72],"access":[73],"initial":[75],"correlated":[76],"variables":[77],"by":[78,151,215],"all":[79],"parties":[80],"(including":[81],"eavesdropper),":[83],"define":[85,106],"information-theoretic":[86,153],"KEM":[87],"(iKEM)":[88],"together":[90],"with":[91,170,202,225],"(computationally)":[93,221],"secure":[94,222,230],"DEM,":[95],"results":[96,244],"model.":[104],"We":[105,143,241],"security":[107,123,138,173],"each":[109],"building":[110],"block,":[111],"prove":[113],"composition":[115],"theorem":[116],"guarantees":[118],"(computational)":[119],"q-chosen-plaintext":[120],"attack":[121,137],"(CPA)":[122],"system":[128,208],"if":[129],"iKEM":[131,147],"DEM":[134],"satisfy":[135],"q-chosen-encapsulation":[136],"one-time":[140],"security,":[141,192],"respectively.":[142],"show":[144],"an":[146,152],"can":[148,210],"be":[149,200,211],"realized":[150],"one-way":[154],"agreement":[157],"(OW-SKA)":[158],"protocol":[159],"where":[160],"single":[162],"message":[163],"transmitted":[165],"from":[166],"Alice":[167],"Bob,":[169],"new":[172,189],"definition":[174,190],"allows":[176,194],"<tex":[177,233],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[178,234],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$q$</tex>":[179,235],"queries":[180],"Alice.":[182],"Using":[183],"OW-SKA":[185],"satisfies":[187],"effectively":[193],"established":[196],"onetime":[204],"symmetric":[205],"implemented,":[212],"example,":[214],"XORing":[216],"output":[218],"pseudorandom":[223],"generator":[224],"message,":[227],"provide":[229],"arbitrary":[236],"messages":[237],"(polynomially":[238],"bounded":[239],"length).":[240],"discuss":[242],"our":[243],"directions":[246],"future":[248],"work.":[249]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2025-10-10T00:00:00"}
